MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9f013594d29867fcdb93c1d1691b592ce8d58bb9ecf9ae6cce74b39eab7ade05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 9f013594d29867fcdb93c1d1691b592ce8d58bb9ecf9ae6cce74b39eab7ade05
SHA3-384 hash: 7a028446e5a3d04c9aa1df9e2f3974aa269d20f7cad147fbc2ed7f8c1fd7bfbdc558e219e141e2ad3ea20e712e83107b
SHA1 hash: bd27c616ce49da3b83a13efa64dde6ea0bd9126c
MD5 hash: 589a98afc5c577152accd50269e45712
humanhash: video-hotel-table-nitrogen
File name:w.sh
Download: download sample
File size:1'135 bytes
First seen:2024-12-30 13:38:00 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 24:bBg71ZNIIo1KSfLTlBuqa7hl9539mrqgb/lTVpIR:bBg71to1xfLTlBuqa7/9539mrqgb/lTY
TLSH T1C32181EE8058542D1CE8DE8C307A4A15FA7CDEC6B1718B1E5D4E64736299B78BD22F0C
Magika txt
Reporter abuse_ch
Tags:sh
URLMalware sample (SHA256 hash)SignatureTags
http://205.185.113.47/binst/main_armn/an/an/a
http://205.185.113.47/binst/main_arm5n/an/an/a
http://205.185.113.47/binst/main_arm6n/an/an/a
http://205.185.113.47/binst/main_arm7n/an/an/a
http://205.185.113.47/binst/main_sh4n/an/an/a
http://205.185.113.47/binst/main_arcn/an/an/a
http://205.185.113.47/binst/main_mipsn/an/an/a
http://205.185.113.47/binst/main_mpsln/an/an/a
http://205.185.113.47/binst/main_sparcn/an/an/a
http://205.185.113.47/binst/main_x86_64n/an/an/a
http://205.185.113.47/binst/main_i686n/an/an/a
http://205.185.113.47/binst/main_i586n/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Document-HTML.Trojan.Heuristic
Status:
Malicious
First seen:
2024-12-30 13:39:03 UTC
File Type:
Text (Shell)
AV detection:
14 of 23 (60.87%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Modifies registry class
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

sh 9f013594d29867fcdb93c1d1691b592ce8d58bb9ecf9ae6cce74b39eab7ade05

(this sample)

  
Delivery method
Distributed via web download

Comments